Lucene search

K
GaizhenbiaoChuanhuchatgpt

11 matches found

CVE
CVE
added 2024/04/10 5:15 p.m.107 views

CVE-2024-2217

gaizhenbiao/chuanhuchatgpt is vulnerable to improper access control, allowing unauthorized access to the config.json file. This vulnerability is present in both authenticated and unauthenticated versions of the application, enabling attackers to obtain sensitive information such as API keys (openai...

7.5CVSS7.2AI score0.00204EPSS
CVE
CVE
added 2024/05/16 9:15 a.m.67 views

CVE-2024-4321

A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker c...

7.5CVSS6.4AI score0.00277EPSS
CVE
CVE
added 2024/07/11 11:15 a.m.52 views

CVE-2024-6035

A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410. This vulnerability allows an attacker to inject malicious JavaScript code into the chat history file. When a victim uploads this file, the malicious script is executed in the victim's browser. T...

7.4CVSS5.8AI score0.00108EPSS
CVE
CVE
added 2024/10/29 1:15 p.m.45 views

CVE-2024-7807

A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT in...

7.5CVSS7.5AI score0.00158EPSS
CVE
CVE
added 2023/06/02 4:15 p.m.43 views

CVE-2023-34094

ChuanhuChatGPT is a graphical user interface for ChatGPT and many large language models. A vulnerability in versions 20230526 and prior allows unauthorized access to the config.json file of the privately deployed ChuanghuChatGPT project, when authentication is not configured. The attacker can explo...

7.5CVSS6AI score0.002EPSS
CVE
CVE
added 2024/06/06 7:16 p.m.43 views

CVE-2024-5124

A timing attack vulnerability exists in the gaizhenbiao/chuanhuchatgpt repository, specifically within the password comparison logic. The vulnerability is present in version 20240310 of the software, where passwords are compared using the '=' operator in Python. This method of comparison allows an ...

7.5CVSS7.5AI score0.35142EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.39 views

CVE-2024-10650

An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups ...

7.5CVSS7.7AI score0.00525EPSS
CVE
CVE
added 2024/06/27 7:15 p.m.36 views

CVE-2024-6038

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability is located in the filter_history function within the utils.py module. This function takes a user-provided keyword and attempts to match it against chat history ...

7.5CVSS7.4AI score0.00156EPSS
CVE
CVE
added 2024/06/27 7:15 p.m.36 views

CVE-2024-6090

A path traversal vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410, allowing any user to delete other users' chat histories. This vulnerability can also be exploited to delete any files ending in .json on the target system, leading to a denial of service as users are unable to aut...

7.5CVSS7.4AI score0.00156EPSS
CVE
CVE
added 2024/10/29 1:15 p.m.35 views

CVE-2024-7962

An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for...

7.5CVSS7.4AI score0.00149EPSS
CVE
CVE
added 2024/06/04 8:15 p.m.24 views

CVE-2024-4520

An improper access control vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically in version 20240410. This vulnerability allows any user on the server to access the chat history of any other user without requiring any form of interaction between the users. Exploitation of...

7.5CVSS7.4AI score0.00176EPSS